idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
30,552 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | void kvm_apic_set_version(struct kvm_vcpu *vcpu)
{
struct kvm_lapic *apic = vcpu->arch.apic;
struct kvm_cpuid_entry2 *feat;
u32 v = APIC_VERSION;
if (!kvm_vcpu_has_lapic(vcpu))
return;
feat = kvm_find_cpuid_entry(apic->vcpu, 0x1, 0);
if (feat && (feat->ecx & (1 << (X86_FEATURE_X2APIC & 31))))
v |= APIC_LVR_... | 246,479,005,438,026,440,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,553 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | void kvm_apic_update_irr(struct kvm_vcpu *vcpu, u32 *pir)
{
u32 i, pir_val;
struct kvm_lapic *apic = vcpu->arch.apic;
for (i = 0; i <= 7; i++) {
pir_val = xchg(&pir[i], 0);
if (pir_val)
*((u32 *)(apic->regs + APIC_IRR + i * 0x10)) |= pir_val;
}
}
| 155,964,402,372,067,780,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,554 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | void kvm_apic_update_tmr(struct kvm_vcpu *vcpu, u32 *tmr)
{
struct kvm_lapic *apic = vcpu->arch.apic;
int i;
for (i = 0; i < 8; i++)
apic_set_reg(apic, APIC_TMR + 0x10 * i, tmr[i]);
}
| 300,865,279,322,535,400,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,555 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | int kvm_create_lapic(struct kvm_vcpu *vcpu)
{
struct kvm_lapic *apic;
ASSERT(vcpu != NULL);
apic_debug("apic_init %d\n", vcpu->vcpu_id);
apic = kzalloc(sizeof(*apic), GFP_KERNEL);
if (!apic)
goto nomem;
vcpu->arch.apic = apic;
apic->regs = (void *)get_zeroed_page(GFP_KERNEL);
if (!apic->regs) {
printk(K... | 3,101,215,506,497,670,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,556 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | void kvm_free_lapic(struct kvm_vcpu *vcpu)
{
struct kvm_lapic *apic = vcpu->arch.apic;
if (!vcpu->arch.apic)
return;
hrtimer_cancel(&apic->lapic_timer.timer);
if (!(vcpu->arch.apic_base & MSR_IA32_APICBASE_ENABLE))
static_key_slow_dec_deferred(&apic_hw_disabled);
if (!(kvm_apic_get_reg(apic, APIC_SPIV) & A... | 189,717,070,513,738,200,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,557 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | int kvm_get_apic_interrupt(struct kvm_vcpu *vcpu)
{
int vector = kvm_apic_has_interrupt(vcpu);
struct kvm_lapic *apic = vcpu->arch.apic;
if (vector == -1)
return -1;
apic_set_isr(vector, apic);
apic_update_ppr(apic);
apic_clear_irr(vector, apic);
return vector;
}
| 26,757,287,029,205,107,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,558 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | u64 kvm_get_lapic_tscdeadline_msr(struct kvm_vcpu *vcpu)
{
struct kvm_lapic *apic = vcpu->arch.apic;
if (!kvm_vcpu_has_lapic(vcpu) || apic_lvtt_oneshot(apic) ||
apic_lvtt_period(apic))
return 0;
return apic->lapic_timer.tscdeadline;
}
| 329,845,988,517,199,860,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,559 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | int kvm_hv_vapic_msr_read(struct kvm_vcpu *vcpu, u32 reg, u64 *data)
{
struct kvm_lapic *apic = vcpu->arch.apic;
u32 low, high = 0;
if (!kvm_vcpu_has_lapic(vcpu))
return 1;
if (apic_reg_read(apic, reg, 4, &low))
return 1;
if (reg == APIC_ICR)
apic_reg_read(apic, APIC_ICR2, 4, &high);
*data = (((u64)high)... | 96,139,432,032,281,370,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,560 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | int kvm_hv_vapic_msr_write(struct kvm_vcpu *vcpu, u32 reg, u64 data)
{
struct kvm_lapic *apic = vcpu->arch.apic;
if (!kvm_vcpu_has_lapic(vcpu))
return 1;
/* if this is ICR write vector before command */
if (reg == APIC_ICR)
apic_reg_write(apic, APIC_ICR2, (u32)(data >> 32));
return apic_reg_write(apic, reg, ... | 284,928,325,657,344,700,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,561 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | static void kvm_ioapic_send_eoi(struct kvm_lapic *apic, int vector)
{
if (!(kvm_apic_get_reg(apic, APIC_SPIV) & APIC_SPIV_DIRECTED_EOI) &&
kvm_ioapic_handles_vector(apic->vcpu->kvm, vector)) {
int trigger_mode;
if (apic_test_vector(vector, apic->regs + APIC_TMR))
trigger_mode = IOAPIC_LEVEL_TRIG;
else
... | 237,193,562,473,635,770,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,562 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | bool kvm_irq_delivery_to_apic_fast(struct kvm *kvm, struct kvm_lapic *src,
struct kvm_lapic_irq *irq, int *r, unsigned long *dest_map)
{
struct kvm_apic_map *map;
unsigned long bitmap = 1;
struct kvm_lapic **dst;
int i;
bool ret = false;
*r = -1;
if (irq->shorthand == APIC_DEST_SELF) {
*r = kvm_apic_set_ir... | 81,689,624,692,822,160,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,563 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | int kvm_lapic_enable_pv_eoi(struct kvm_vcpu *vcpu, u64 data)
{
u64 addr = data & ~KVM_MSR_ENABLED;
if (!IS_ALIGNED(addr, 4))
return 1;
vcpu->arch.pv_eoi.msr_val = data;
if (!pv_eoi_enabled(vcpu))
return 0;
return kvm_gfn_to_hva_cache_init(vcpu->kvm, &vcpu->arch.pv_eoi.data,
addr, sizeof(u8));
}
| 95,302,212,080,343,370,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,564 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | u64 kvm_lapic_get_cr8(struct kvm_vcpu *vcpu)
{
u64 tpr;
if (!kvm_vcpu_has_lapic(vcpu))
return 0;
tpr = (u64) kvm_apic_get_reg(vcpu->arch.apic, APIC_TASKPRI);
return (tpr & 0xf0) >> 4;
}
| 311,275,152,871,652,720,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,565 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | void kvm_lapic_init(void)
{
/* do not patch jump label more than once per second */
jump_label_rate_limit(&apic_hw_disabled, HZ);
jump_label_rate_limit(&apic_sw_disabled, HZ);
}
| 339,245,636,811,292,500,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,566 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | void kvm_lapic_reset(struct kvm_vcpu *vcpu)
{
struct kvm_lapic *apic;
int i;
apic_debug("%s\n", __func__);
ASSERT(vcpu);
apic = vcpu->arch.apic;
ASSERT(apic != NULL);
/* Stop the timer in case it's a reset to an active apic */
hrtimer_cancel(&apic->lapic_timer.timer);
kvm_apic_set_id(apic, vcpu->vcpu_id);
... | 126,245,697,009,321,190,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,567 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | void kvm_lapic_set_eoi(struct kvm_vcpu *vcpu)
{
if (kvm_vcpu_has_lapic(vcpu))
apic_reg_write(vcpu->arch.apic, APIC_EOI, 0);
}
| 41,971,686,656,134,330,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,568 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | void kvm_lapic_set_tpr(struct kvm_vcpu *vcpu, unsigned long cr8)
{
struct kvm_lapic *apic = vcpu->arch.apic;
if (!kvm_vcpu_has_lapic(vcpu))
return;
apic_set_tpr(apic, ((cr8 & 0x0f) << 4)
| (kvm_apic_get_reg(apic, APIC_TASKPRI) & 4));
}
| 229,351,002,139,449,040,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,569 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | int kvm_lapic_set_vapic_addr(struct kvm_vcpu *vcpu, gpa_t vapic_addr)
{
if (vapic_addr) {
if (kvm_gfn_to_hva_cache_init(vcpu->kvm,
&vcpu->arch.apic->vapic_cache,
vapic_addr, sizeof(u32)))
return -EINVAL;
__set_bit(KVM_APIC_CHECK_VAPIC, &vcpu->arch.apic_attention);
} else {
__clear_bit(KVM_APIC_CHEC... | 260,078,683,201,637,850,000,000,000,000,000,000,000 | lapic.c | 254,914,464,310,514,520,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,570 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | void kvm_lapic_sync_from_vapic(struct kvm_vcpu *vcpu)
{
u32 data;
if (test_bit(KVM_APIC_PV_EOI_PENDING, &vcpu->arch.apic_attention))
apic_sync_pv_eoi_from_guest(vcpu, vcpu->arch.apic);
if (!test_bit(KVM_APIC_CHECK_VAPIC, &vcpu->arch.apic_attention))
return;
kvm_read_guest_cached(vcpu->kvm, &vcpu->arch.apic->... | 175,716,106,189,800,570,000,000,000,000,000,000,000 | lapic.c | 117,888,982,784,563,870,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,571 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | void kvm_lapic_sync_to_vapic(struct kvm_vcpu *vcpu)
{
u32 data, tpr;
int max_irr, max_isr;
struct kvm_lapic *apic = vcpu->arch.apic;
apic_sync_pv_eoi_to_guest(vcpu, apic);
if (!test_bit(KVM_APIC_CHECK_VAPIC, &vcpu->arch.apic_attention))
return;
tpr = kvm_apic_get_reg(apic, APIC_TASKPRI) & 0xff;
max_irr = ap... | 53,382,882,967,839,710,000,000,000,000,000,000,000 | lapic.c | 117,888,982,784,563,870,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,572 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | int kvm_x2apic_msr_read(struct kvm_vcpu *vcpu, u32 msr, u64 *data)
{
struct kvm_lapic *apic = vcpu->arch.apic;
u32 reg = (msr - APIC_BASE_MSR) << 4, low, high = 0;
if (!irqchip_in_kernel(vcpu->kvm) || !apic_x2apic_mode(apic))
return 1;
if (apic_reg_read(apic, reg, 4, &low))
return 1;
if (msr == 0x830)
apic... | 305,470,346,221,218,200,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,573 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | int kvm_x2apic_msr_write(struct kvm_vcpu *vcpu, u32 msr, u64 data)
{
struct kvm_lapic *apic = vcpu->arch.apic;
u32 reg = (msr - APIC_BASE_MSR) << 4;
if (!irqchip_in_kernel(vcpu->kvm) || !apic_x2apic_mode(apic))
return 1;
/* if this is ICR write vector before command */
if (msr == 0x830)
apic_reg_write(apic, ... | 66,660,052,514,001,630,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,574 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | static bool lapic_is_periodic(struct kvm_lapic *apic)
{
return apic_lvtt_period(apic);
}
| 51,234,389,899,268,895,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,575 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | static void pv_eoi_clr_pending(struct kvm_vcpu *vcpu)
{
if (pv_eoi_put_user(vcpu, KVM_PV_EOI_DISABLED) < 0) {
apic_debug("Can't clear EOI MSR value: 0x%llx\n",
(unsigned long long)vcpi->arch.pv_eoi.msr_val);
return;
}
__clear_bit(KVM_APIC_PV_EOI_PENDING, &vcpu->arch.apic_attention);
}
| 177,077,572,970,786,300,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,576 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | static inline bool pv_eoi_enabled(struct kvm_vcpu *vcpu)
{
return vcpu->arch.pv_eoi.msr_val & KVM_MSR_ENABLED;
}
| 67,806,500,498,077,680,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,577 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | static bool pv_eoi_get_pending(struct kvm_vcpu *vcpu)
{
u8 val;
if (pv_eoi_get_user(vcpu, &val) < 0)
apic_debug("Can't read EOI MSR value: 0x%llx\n",
(unsigned long long)vcpi->arch.pv_eoi.msr_val);
return val & 0x1;
}
| 67,259,999,783,779,070,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,578 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | static int pv_eoi_put_user(struct kvm_vcpu *vcpu, u8 val)
{
return kvm_write_guest_cached(vcpu->kvm, &vcpu->arch.pv_eoi.data, &val,
sizeof(val));
}
| 336,093,269,242,239,800,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,579 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | static void pv_eoi_set_pending(struct kvm_vcpu *vcpu)
{
if (pv_eoi_put_user(vcpu, KVM_PV_EOI_ENABLED) < 0) {
apic_debug("Can't set EOI MSR value: 0x%llx\n",
(unsigned long long)vcpi->arch.pv_eoi.msr_val);
return;
}
__set_bit(KVM_APIC_PV_EOI_PENDING, &vcpu->arch.apic_attention);
}
| 226,669,375,364,756,950,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,580 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | static inline void report_tpr_access(struct kvm_lapic *apic, bool write)
{
if (apic->vcpu->arch.tpr_access_reporting)
__report_tpr_access(apic, write);
}
| 214,425,639,298,251,360,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,581 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | static void start_apic_timer(struct kvm_lapic *apic)
{
ktime_t now;
atomic_set(&apic->lapic_timer.pending, 0);
if (apic_lvtt_period(apic) || apic_lvtt_oneshot(apic)) {
/* lapic timer in oneshot or periodic mode */
now = apic->lapic_timer.timer.base->get_time();
apic->lapic_timer.period = (u64)kvm_apic_get_reg... | 288,592,932,918,996,150,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,582 | linux | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271 | KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 0 | static inline struct kvm_lapic *to_lapic(struct kvm_io_device *dev)
{
return container_of(dev, struct kvm_lapic, dev);
}
| 59,358,282,137,100,840,000,000,000,000,000,000,000 | lapic.c | 190,243,646,842,195,860,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-6376 | The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. | https://nvd.nist.gov/vuln/detail/CVE-2013-6376 |
30,739 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | static int ssl3_prf( unsigned char *secret, size_t slen, char *label,
unsigned char *random, size_t rlen,
unsigned char *dstbuf, size_t dlen )
{
size_t i;
md5_context md5;
sha1_context sha1;
unsigned char padding[16];
unsigned char sha1sum[20];
((void)la... | 259,145,367,566,498,740,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,740 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | static void ssl_calc_finished_ssl(
ssl_context *ssl, unsigned char *buf, int from )
{
const char *sender;
md5_context md5;
sha1_context sha1;
unsigned char padbuf[48];
unsigned char md5sum[16];
unsigned char sha1sum[20];
ssl_session *session = ssl->session_negotiate;
i... | 227,797,140,100,927,560,000,000,000,000,000,000,000 | ssl_tls.c | 176,090,796,145,832,660,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,741 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | static void ssl_calc_finished_tls(
ssl_context *ssl, unsigned char *buf, int from )
{
int len = 12;
const char *sender;
md5_context md5;
sha1_context sha1;
unsigned char padbuf[36];
ssl_session *session = ssl->session_negotiate;
if( !session )
session = ssl->session... | 258,313,168,734,153,230,000,000,000,000,000,000,000 | ssl_tls.c | 176,090,796,145,832,660,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,742 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | static void ssl_calc_finished_tls_sha256(
ssl_context *ssl, unsigned char *buf, int from )
{
int len = 12;
const char *sender;
sha2_context sha2;
unsigned char padbuf[32];
ssl_session *session = ssl->session_negotiate;
if( !session )
session = ssl->session;
SSL_DEBU... | 32,539,421,284,916,230,000,000,000,000,000,000,000 | ssl_tls.c | 176,090,796,145,832,660,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,743 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_calc_verify_ssl( ssl_context *ssl, unsigned char hash[36] )
{
md5_context md5;
sha1_context sha1;
unsigned char pad_1[48];
unsigned char pad_2[48];
SSL_DEBUG_MSG( 2, ( "=> calc verify ssl" ) );
memcpy( &md5 , &ssl->handshake->fin_md5 , sizeof(md5_context) );
memcpy( &sha1, &ssl->... | 327,812,754,577,999,740,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,744 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_calc_verify_tls( ssl_context *ssl, unsigned char hash[36] )
{
md5_context md5;
sha1_context sha1;
SSL_DEBUG_MSG( 2, ( "=> calc verify tls" ) );
memcpy( &md5 , &ssl->handshake->fin_md5 , sizeof(md5_context) );
memcpy( &sha1, &ssl->handshake->fin_sha1, sizeof(sha1_context) );
md5_fin... | 44,879,641,869,542,630,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,745 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_close_notify( ssl_context *ssl )
{
int ret;
SSL_DEBUG_MSG( 2, ( "=> write close notify" ) );
if( ( ret = ssl_flush_output( ssl ) ) != 0 )
{
SSL_DEBUG_RET( 1, "ssl_flush_output", ret );
return( ret );
}
if( ssl->state == SSL_HANDSHAKE_OVER )
{
if( ( ret = ss... | 316,442,855,252,244,970,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,746 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | static int ssl_compress_buf( ssl_context *ssl )
{
int ret;
unsigned char *msg_post = ssl->out_msg;
size_t len_pre = ssl->out_msglen;
unsigned char *msg_pre;
SSL_DEBUG_MSG( 2, ( "=> compress buf" ) );
msg_pre = (unsigned char*) malloc( len_pre );
if( msg_pre == NULL )
{
SSL_DEBU... | 13,347,279,008,671,154,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,747 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | static int ssl_decompress_buf( ssl_context *ssl )
{
int ret;
unsigned char *msg_post = ssl->in_msg;
size_t len_pre = ssl->in_msglen;
unsigned char *msg_pre;
SSL_DEBUG_MSG( 2, ( "=> decompress buf" ) );
msg_pre = (unsigned char*) malloc( len_pre );
if( msg_pre == NULL )
{
SSL_DE... | 192,281,112,598,116,300,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,748 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | static int ssl_decrypt_buf( ssl_context *ssl )
{
size_t i, padlen = 0, correct = 1;
unsigned char tmp[POLARSSL_SSL_MAX_MAC_SIZE];
SSL_DEBUG_MSG( 2, ( "=> decrypt buf" ) );
if( ssl->in_msglen < ssl->transform_in->minlen )
{
SSL_DEBUG_MSG( 1, ( "in_msglen (%d) < minlen (%d)",
... | 324,559,861,489,770,400,000,000,000,000,000,000,000 | ssl_tls.c | 176,090,796,145,832,660,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,749 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_derive_keys( ssl_context *ssl )
{
unsigned char tmp[64];
unsigned char keyblk[256];
unsigned char *key1;
unsigned char *key2;
unsigned int iv_copy_len;
ssl_session *session = ssl->session_negotiate;
ssl_transform *transform = ssl->transform_negotiate;
ssl_handshake_params *handsh... | 213,361,960,690,587,900,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,750 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_fetch_input( ssl_context *ssl, size_t nb_want )
{
int ret;
size_t len;
SSL_DEBUG_MSG( 2, ( "=> fetch input" ) );
while( ssl->in_left < nb_want )
{
len = nb_want - ssl->in_left;
ret = ssl->f_recv( ssl->p_recv, ssl->in_hdr + ssl->in_left, len );
SSL_DEBUG_MSG( 2, ( "... | 206,222,106,503,176,000,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,751 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_flush_output( ssl_context *ssl )
{
int ret;
unsigned char *buf;
SSL_DEBUG_MSG( 2, ( "=> flush output" ) );
while( ssl->out_left > 0 )
{
SSL_DEBUG_MSG( 2, ( "message length: %d, out_left: %d",
5 + ssl->out_msglen, ssl->out_left ) );
if( ssl->out_msgle... | 216,298,202,556,168,400,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,752 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_free( ssl_context *ssl )
{
SSL_DEBUG_MSG( 2, ( "=> free" ) );
free( ssl->ciphersuites );
if( ssl->out_ctr != NULL )
{
memset( ssl->out_ctr, 0, SSL_BUFFER_LEN );
free( ssl->out_ctr );
}
if( ssl->in_ctr != NULL )
{
memset( ssl->in_ctr, 0, SSL_BUFFER_LEN );... | 133,279,378,646,131,520,000,000,000,000,000,000,000 | ssl_tls.c | 176,090,796,145,832,660,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,753 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | size_t ssl_get_bytes_avail( const ssl_context *ssl )
{
return( ssl->in_offt == NULL ? 0 : ssl->in_msglen );
}
| 301,497,466,310,536,460,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,754 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | const char *ssl_get_ciphersuite( const ssl_context *ssl )
{
if( ssl == NULL || ssl->session == NULL )
return NULL;
return ssl_get_ciphersuite_name( ssl->session->ciphersuite );
}
| 64,991,780,047,319,520,000,000,000,000,000,000,000 | ssl_tls.c | 176,090,796,145,832,660,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,755 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_get_ciphersuite_id( const char *ciphersuite_name )
{
#if defined(POLARSSL_ARC4_C)
if (0 == strcasecmp(ciphersuite_name, "TLS-RSA-WITH-RC4-128-MD5"))
return( TLS_RSA_WITH_RC4_128_MD5 );
if (0 == strcasecmp(ciphersuite_name, "TLS-RSA-WITH-RC4-128-SHA"))
return( TLS_RSA_WITH_RC4_128_SHA );
... | 327,899,388,082,532,320,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,756 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | const char *ssl_get_ciphersuite_name( const int ciphersuite_id )
{
switch( ciphersuite_id )
{
#if defined(POLARSSL_ARC4_C)
case TLS_RSA_WITH_RC4_128_MD5:
return( "TLS-RSA-WITH-RC4-128-MD5" );
case TLS_RSA_WITH_RC4_128_SHA:
return( "TLS-RSA-WITH-RC4-128-SHA" );
#endif
#i... | 218,027,159,527,620,100,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,757 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_get_verify_result( const ssl_context *ssl )
{
return( ssl->verify_result );
}
| 164,424,942,396,600,880,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,758 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | const char *ssl_get_version( const ssl_context *ssl )
{
switch( ssl->minor_ver )
{
case SSL_MINOR_VERSION_0:
return( "SSLv3.0" );
case SSL_MINOR_VERSION_1:
return( "TLSv1.0" );
case SSL_MINOR_VERSION_2:
return( "TLSv1.1" );
case SSL_MINOR_VE... | 195,778,728,159,846,000,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,759 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_handshake( ssl_context *ssl )
{
int ret = 0;
SSL_DEBUG_MSG( 2, ( "=> handshake" ) );
while( ssl->state != SSL_HANDSHAKE_OVER )
{
ret = ssl_handshake_step( ssl );
if( ret != 0 )
break;
}
SSL_DEBUG_MSG( 2, ( "<= handshake" ) );
return( ret );
}
| 99,268,883,309,858,630,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,760 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_handshake_free( ssl_handshake_params *handshake )
{
#if defined(POLARSSL_DHM_C)
dhm_free( &handshake->dhm_ctx );
#endif
memset( handshake, 0, sizeof( ssl_handshake_params ) );
}
| 71,507,345,840,980,760,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,761 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_handshake_step( ssl_context *ssl )
{
int ret = POLARSSL_ERR_SSL_FEATURE_UNAVAILABLE;
#if defined(POLARSSL_SSL_CLI_C)
if( ssl->endpoint == SSL_IS_CLIENT )
ret = ssl_handshake_client_step( ssl );
#endif
#if defined(POLARSSL_SSL_SRV_C)
if( ssl->endpoint == SSL_IS_SERVER )
ret = ssl_ha... | 324,812,929,924,490,250,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,762 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_handshake_wrapup( ssl_context *ssl )
{
SSL_DEBUG_MSG( 3, ( "=> handshake wrapup" ) );
/*
* Free our handshake params
*/
ssl_handshake_free( ssl->handshake );
free( ssl->handshake );
ssl->handshake = NULL;
/*
* Switch in our now active transform context
*/
if( s... | 28,844,948,796,686,927,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,763 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_init( ssl_context *ssl )
{
int ret;
int len = SSL_BUFFER_LEN;
memset( ssl, 0, sizeof( ssl_context ) );
/*
* Sane defaults
*/
ssl->rsa_decrypt = ssl_rsa_decrypt;
ssl->rsa_sign = ssl_rsa_sign;
ssl->rsa_key_len = ssl_rsa_key_len;
ssl->min_major_ver = SSL_MAJOR_VERSION_3... | 79,835,671,093,987,590,000,000,000,000,000,000,000 | ssl_tls.c | 176,090,796,145,832,660,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,764 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_legacy_renegotiation( ssl_context *ssl, int allow_legacy )
{
ssl->allow_legacy_renegotiation = allow_legacy;
}
| 120,063,536,234,318,680,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,765 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | static void ssl_mac_md5( unsigned char *secret,
unsigned char *buf, size_t len,
unsigned char *ctr, int type )
{
unsigned char header[11];
unsigned char padding[48];
md5_context md5;
memcpy( header, ctr, 8 );
header[ 8] = (unsigned char) type;
... | 192,546,140,426,189,430,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,766 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | static void ssl_mac_sha1( unsigned char *secret,
unsigned char *buf, size_t len,
unsigned char *ctr, int type )
{
unsigned char header[11];
unsigned char padding[40];
sha1_context sha1;
memcpy( header, ctr, 8 );
header[ 8] = (unsigned char) type;... | 202,103,806,524,427,270,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,767 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | static void ssl_mac_sha2( unsigned char *secret,
unsigned char *buf, size_t len,
unsigned char *ctr, int type )
{
unsigned char header[11];
unsigned char padding[32];
sha2_context sha2;
memcpy( header, ctr, 8 );
header[ 8] = (unsigned char) type;... | 182,159,895,322,115,240,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,768 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_parse_finished( ssl_context *ssl )
{
int ret;
unsigned int hash_len;
unsigned char buf[36];
SSL_DEBUG_MSG( 2, ( "=> parse finished" ) );
ssl->handshake->calc_finished( ssl, buf, ssl->endpoint ^ 1 );
/*
* Switch to our negotiated transform and session parameters for inbound data.
... | 140,047,456,660,971,160,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,769 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_read( ssl_context *ssl, unsigned char *buf, size_t len )
{
int ret;
size_t n;
SSL_DEBUG_MSG( 2, ( "=> read" ) );
if( ssl->state != SSL_HANDSHAKE_OVER )
{
if( ( ret = ssl_handshake( ssl ) ) != 0 )
{
SSL_DEBUG_RET( 1, "ssl_handshake", ret );
return( re... | 35,555,891,539,156,640,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,770 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_renegotiate( ssl_context *ssl )
{
int ret;
SSL_DEBUG_MSG( 2, ( "=> renegotiate" ) );
if( ssl->state != SSL_HANDSHAKE_OVER )
return( POLARSSL_ERR_SSL_BAD_INPUT_DATA );
ssl->state = SSL_HELLO_REQUEST;
ssl->renegotiation = SSL_RENEGOTIATION;
if( ( ret = ssl_handshake_init( ssl )... | 231,119,823,509,297,940,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,771 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | static int ssl_rsa_decrypt( void *ctx, int mode, size_t *olen,
const unsigned char *input, unsigned char *output,
size_t output_max_len )
{
return rsa_pkcs1_decrypt( (rsa_context *) ctx, mode, olen, input, output,
output_max_len );
}
| 112,059,249,524,316,280,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,772 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_send_alert_message( ssl_context *ssl,
unsigned char level,
unsigned char message )
{
int ret;
SSL_DEBUG_MSG( 2, ( "=> send alert message" ) );
ssl->out_msgtype = SSL_MSG_ALERT;
ssl->out_msglen = 2;
ssl->out_msg[0] = level;
ssl->ou... | 282,416,651,076,434,130,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,773 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_send_fatal_handshake_failure( ssl_context *ssl )
{
int ret;
if( ( ret = ssl_send_alert_message( ssl,
SSL_ALERT_LEVEL_FATAL,
SSL_ALERT_MSG_HANDSHAKE_FAILURE ) ) != 0 )
{
return( ret );
}
return( 0 );
}
| 95,385,421,500,574,970,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,774 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_session_free( ssl_session *session )
{
if( session->peer_cert != NULL )
{
x509_free( session->peer_cert );
free( session->peer_cert );
}
memset( session, 0, sizeof( ssl_session ) );
}
| 134,139,395,177,400,580,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,775 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_session_reset( ssl_context *ssl )
{
int ret;
ssl->state = SSL_HELLO_REQUEST;
ssl->renegotiation = SSL_INITIAL_HANDSHAKE;
ssl->secure_renegotiation = SSL_LEGACY_RENEGOTIATION;
ssl->verify_data_len = 0;
memset( ssl->own_verify_data, 0, 36 );
memset( ssl->peer_verify_data, 0, 36 );
... | 273,629,298,303,821,700,000,000,000,000,000,000,000 | ssl_tls.c | 176,090,796,145,832,660,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,776 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_set_authmode( ssl_context *ssl, int authmode )
{
ssl->authmode = authmode;
}
| 286,525,047,736,391,760,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,777 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_set_bio( ssl_context *ssl,
int (*f_recv)(void *, unsigned char *, size_t), void *p_recv,
int (*f_send)(void *, const unsigned char *, size_t), void *p_send )
{
ssl->f_recv = f_recv;
ssl->f_send = f_send;
ssl->p_recv = p_recv;
ssl->p_send = p_send;
}
| 140,771,396,698,528,730,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,778 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_set_ca_chain( ssl_context *ssl, x509_cert *ca_chain,
x509_crl *ca_crl, const char *peer_cn )
{
ssl->ca_chain = ca_chain;
ssl->ca_crl = ca_crl;
ssl->peer_cn = peer_cn;
}
| 229,780,259,454,432,070,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,779 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_set_ciphersuites( ssl_context *ssl, const int *ciphersuites )
{
ssl->ciphersuites[SSL_MINOR_VERSION_0] = ciphersuites;
ssl->ciphersuites[SSL_MINOR_VERSION_1] = ciphersuites;
ssl->ciphersuites[SSL_MINOR_VERSION_2] = ciphersuites;
ssl->ciphersuites[SSL_MINOR_VERSION_3] = ciphersuites;
}
| 26,444,550,735,912,928,000,000,000,000,000,000,000 | ssl_tls.c | 176,090,796,145,832,660,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,780 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_set_ciphersuites_for_version( ssl_context *ssl, const int *ciphersuites,
int major, int minor )
{
if( major != SSL_MAJOR_VERSION_3 )
return;
if( minor < SSL_MINOR_VERSION_0 || minor > SSL_MINOR_VERSION_3 )
return;
ssl->ciphersuites[minor] = c... | 318,826,175,968,819,340,000,000,000,000,000,000,000 | ssl_tls.c | 176,090,796,145,832,660,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,781 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_set_dh_param( ssl_context *ssl, const char *dhm_P, const char *dhm_G )
{
int ret;
if( ( ret = mpi_read_string( &ssl->dhm_P, 16, dhm_P ) ) != 0 )
{
SSL_DEBUG_RET( 1, "mpi_read_string", ret );
return( ret );
}
if( ( ret = mpi_read_string( &ssl->dhm_G, 16, dhm_G ) ) != 0 )
... | 134,217,684,973,095,220,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,782 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_set_dh_param_ctx( ssl_context *ssl, dhm_context *dhm_ctx )
{
int ret;
if( ( ret = mpi_copy(&ssl->dhm_P, &dhm_ctx->P) ) != 0 )
{
SSL_DEBUG_RET( 1, "mpi_copy", ret );
return( ret );
}
if( ( ret = mpi_copy(&ssl->dhm_G, &dhm_ctx->G) ) != 0 )
{
SSL_DEBUG_RET( 1, "mpi... | 63,429,767,597,537,330,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,783 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_set_endpoint( ssl_context *ssl, int endpoint )
{
ssl->endpoint = endpoint;
}
| 66,484,119,641,992,080,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,784 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_set_hostname( ssl_context *ssl, const char *hostname )
{
if( hostname == NULL )
return( POLARSSL_ERR_SSL_BAD_INPUT_DATA );
ssl->hostname_len = strlen( hostname );
ssl->hostname = (unsigned char *) malloc( ssl->hostname_len + 1 );
if( ssl->hostname == NULL )
return( POLARSSL_ERR... | 262,584,988,433,910,500,000,000,000,000,000,000,000 | ssl_tls.c | 176,090,796,145,832,660,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,785 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_set_max_version( ssl_context *ssl, int major, int minor )
{
ssl->max_major_ver = major;
ssl->max_minor_ver = minor;
}
| 39,178,261,474,011,243,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,786 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_set_min_version( ssl_context *ssl, int major, int minor )
{
ssl->min_major_ver = major;
ssl->min_minor_ver = minor;
}
| 50,381,904,732,196,520,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,787 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_set_own_cert( ssl_context *ssl, x509_cert *own_cert,
rsa_context *rsa_key )
{
ssl->own_cert = own_cert;
ssl->rsa_key = rsa_key;
}
| 121,269,220,887,999,350,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,788 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_set_own_cert_alt( ssl_context *ssl, x509_cert *own_cert,
void *rsa_key,
rsa_decrypt_func rsa_decrypt,
rsa_sign_func rsa_sign,
rsa_key_len_func rsa_key_len )
{
ssl->own_cert = own_cert;
ssl->rsa... | 255,062,567,071,688,650,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,789 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_set_renegotiation( ssl_context *ssl, int renegotiation )
{
ssl->disable_renegotiation = renegotiation;
}
| 140,712,048,915,129,100,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,790 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_set_rng( ssl_context *ssl,
int (*f_rng)(void *, unsigned char *, size_t),
void *p_rng )
{
ssl->f_rng = f_rng;
ssl->p_rng = p_rng;
}
| 36,349,515,152,057,727,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,791 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_set_session( ssl_context *ssl, const ssl_session *session )
{
memcpy( ssl->session_negotiate, session, sizeof(ssl_session) );
ssl->handshake->resume = 1;
}
| 236,903,782,807,480,900,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,792 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_set_verify( ssl_context *ssl,
int (*f_vrfy)(void *, x509_cert *, int, int *),
void *p_vrfy )
{
ssl->f_vrfy = f_vrfy;
ssl->p_vrfy = p_vrfy;
}
| 174,599,036,394,051,440,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,793 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | void ssl_transform_free( ssl_transform *transform )
{
#if defined(POLARSSL_ZLIB_SUPPORT)
deflateEnd( &transform->ctx_deflate );
inflateEnd( &transform->ctx_inflate );
#endif
memset( transform, 0, sizeof( ssl_transform ) );
}
| 155,092,129,908,125,770,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,794 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | static void ssl_update_checksum_md5sha1( ssl_context *ssl, unsigned char *buf,
size_t len )
{
md5_update( &ssl->handshake->fin_md5 , buf, len );
sha1_update( &ssl->handshake->fin_sha1, buf, len );
}
| 177,047,794,045,423,150,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,795 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | static void ssl_update_checksum_sha256( ssl_context *ssl, unsigned char *buf,
size_t len )
{
sha2_update( &ssl->handshake->fin_sha2, buf, len );
}
| 320,407,401,934,633,720,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,796 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | static void ssl_update_checksum_sha384( ssl_context *ssl, unsigned char *buf,
size_t len )
{
sha4_update( &ssl->handshake->fin_sha4, buf, len );
}
| 205,421,171,424,762,330,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,797 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | static void ssl_update_checksum_start( ssl_context *ssl, unsigned char *buf,
size_t len )
{
md5_update( &ssl->handshake->fin_md5 , buf, len );
sha1_update( &ssl->handshake->fin_sha1, buf, len );
sha2_update( &ssl->handshake->fin_sha2, buf, len );
#if defined(POLARSSL_... | 315,310,723,928,277,130,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,798 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_write( ssl_context *ssl, const unsigned char *buf, size_t len )
{
int ret;
size_t n;
SSL_DEBUG_MSG( 2, ( "=> write" ) );
if( ssl->state != SSL_HANDSHAKE_OVER )
{
if( ( ret = ssl_handshake( ssl ) ) != 0 )
{
SSL_DEBUG_RET( 1, "ssl_handshake", ret );
re... | 244,101,708,119,796,670,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,799 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_write_certificate( ssl_context *ssl )
{
int ret;
size_t i, n;
const x509_cert *crt;
SSL_DEBUG_MSG( 2, ( "=> write certificate" ) );
if( ssl->endpoint == SSL_IS_CLIENT )
{
if( ssl->client_auth == 0 )
{
SSL_DEBUG_MSG( 2, ( "<= skip write certificate" ) );
... | 238,990,133,467,170,130,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,800 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_write_change_cipher_spec( ssl_context *ssl )
{
int ret;
SSL_DEBUG_MSG( 2, ( "=> write change cipher spec" ) );
ssl->out_msgtype = SSL_MSG_CHANGE_CIPHER_SPEC;
ssl->out_msglen = 1;
ssl->out_msg[0] = 1;
ssl->state++;
if( ( ret = ssl_write_record( ssl ) ) != 0 )
{
SSL_D... | 132,635,433,928,187,030,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,801 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_write_finished( ssl_context *ssl )
{
int ret, hash_len;
SSL_DEBUG_MSG( 2, ( "=> write finished" ) );
ssl->handshake->calc_finished( ssl, ssl->out_msg + 4, ssl->endpoint );
hash_len = ( ssl->minor_ver == SSL_MINOR_VERSION_0 ) ? 36 : 12;
ssl->verify_data_len = hash_len;
memcpy( ssl->ow... | 211,033,809,348,206,650,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,802 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | int ssl_write_record( ssl_context *ssl )
{
int ret, done = 0;
size_t len = ssl->out_msglen;
SSL_DEBUG_MSG( 2, ( "=> write record" ) );
if( ssl->out_msgtype == SSL_MSG_HANDSHAKE )
{
ssl->out_msg[1] = (unsigned char)( ( len - 4 ) >> 16 );
ssl->out_msg[2] = (unsigned char)( ( len - 4 ... | 260,647,228,652,991,370,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,803 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | static int tls1_prf( unsigned char *secret, size_t slen, char *label,
unsigned char *random, size_t rlen,
unsigned char *dstbuf, size_t dlen )
{
size_t nb, hs;
size_t i, j, k;
unsigned char *S1, *S2;
unsigned char tmp[128];
unsigned char h_i[20];
if( si... | 28,278,213,366,835,244,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,804 | polarssl | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859 | ssl_parse_certificate() now calls x509parse_crt_der() directly | 0 | static int tls_prf_sha384( unsigned char *secret, size_t slen, char *label,
unsigned char *random, size_t rlen,
unsigned char *dstbuf, size_t dlen )
{
size_t nb;
size_t i, j, k;
unsigned char tmp[128];
unsigned char h_i[48];
if( sizeof( tmp ) < ... | 99,200,910,794,316,900,000,000,000,000,000,000,000 | ssl_tls.c | 193,081,241,478,287,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4623 | The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi... | https://nvd.nist.gov/vuln/detail/CVE-2013-4623 |
30,805 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static unsigned long __gfn_to_hva_many(struct kvm_memory_slot *slot, gfn_t gfn,
gfn_t *nr_pages, bool write)
{
if (!slot || slot->flags & KVM_MEMSLOT_INVALID)
return KVM_HVA_ERR_BAD;
if (memslot_is_readonly(slot) && write)
return KVM_HVA_ERR_RO_BAD;
if (nr_pages)
*nr_pages = slot->npages - (gfn - ... | 270,707,010,617,178,200,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,806 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static pfn_t __gfn_to_pfn(struct kvm *kvm, gfn_t gfn, bool atomic, bool *async,
bool write_fault, bool *writable)
{
struct kvm_memory_slot *slot;
if (async)
*async = false;
slot = gfn_to_memslot(kvm, gfn);
return __gfn_to_pfn_memslot(slot, gfn, atomic, async, write_fault,
writable);
}
| 60,140,736,413,886,050,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,807 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | __gfn_to_pfn_memslot(struct kvm_memory_slot *slot, gfn_t gfn, bool atomic,
bool *async, bool write_fault, bool *writable)
{
unsigned long addr = __gfn_to_hva_many(slot, gfn, NULL, write_fault);
if (addr == KVM_HVA_ERR_RO_BAD)
return KVM_PFN_ERR_RO_FAULT;
if (kvm_is_error_hva(addr))
return KVM_PFN_ERR_BA... | 273,060,406,530,246,900,000,000,000,000,000,000,000 | kvm_main.c | 6,339,372,324,102,888,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.